Health & Care

Countrywide/large-scale connected-care systems, including Scotland, U.S. military, Chile, Partners Healthcare, and five regional health information exchanges in the United States use InterSystems technology.

Security Model

Provide Security Without Sacrificing Performance

InterSystems’ products provide flexible and robust security capabilities while minimizing the burden on application performance. Our products are designed to support secure application deployment in three ways:

The security of our products is based on:

AuthenticationAuthentication is how users (humans, devices, other applications) prove that they are who they say they are. Our products support a number of authentication mechanisms, including two-factor authentication.

AuthorizationDetermines what resources a user is allowed to use, view, or alter. Assignation and management of privileges (including role-based and application-based privileges) are easily accomplished through our products’ System Management Portals.

AuditingIn our products, all system and application events are recorded in an append-only log, which is compatible with any query or reporting tool that uses SQL.

Data EncryptionWe provide mechanisms for encrypting both data-at-rest and data-in-motion.